SC-2: APPLICATION PARTITIONING
TAILORING FOR INDUSTRIAL CONTROL SYSTEMS
ICS Control Baselines:
- Moderate
- High
The information system separates user functionality (including user interface services) from information system management functionality.
SUPPLEMENTAL GUIDANCE
Information system management functionality includes, for example, functions necessary to administer databases, network components, workstations, or servers, and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical. Organizations implement separation of system management-related functionality from user functionality by using different computers, different central processing units, different instances of operating systems, different network addresses, virtualization techniques, or combinations of these or other methods, as appropriate. This type of separation includes, for example, web administrative interfaces that use separate authentication methods for users of any other information system resources. Separation of system and user functionality may include isolating administrative interfaces on different domains and with additional access controls.
ICS SUPPLEMENTAL GUIDANCE
Systems used to manage the ICS should be separate from the operational ICS components. Example compensating controls include providing increased auditing measures.
RELATED CONTROLS: SC-2
CONTROL ENHANCEMENTS
SC-2 (1) APPLICATION PARTITIONING | INTERFACES FOR NON-PRIVILEGED USERS
NOT SELECTED FOR THE NIST ISC CONTROL SET
The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
Supplemental Guidance:
This control enhancement ensures that administration options (e.g., administrator privileges) are not available to general users (including prohibiting the use of the grey-out option commonly used to eliminate accessibility to such information). Such restrictions include, for example, not presenting administration options until users establish sessions with administrator privileges.
RELATED CONTROLS: SC-2 (1)
REFERENCES:
- NIST Special Publication 800-82 | GUIDE TO INDUSTRIAL CONTROL SYSTEMS (ICS) SECURITY